{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T18:21:29Z","timestamp":1773771689216,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":64,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T00:00:00Z","timestamp":1636761600000},"content-version":"vor","delay-in-days":1,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["1943509"],"award-info":[{"award-number":["1943509"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3484549","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:34Z","timestamp":1636805134000},"page":"700-714","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":31,"title":["Periscope: A Keystroke Inference Attack Using Human Coupled Electromagnetic Emanations"],"prefix":"10.1145","author":[{"given":"Wenqiang","family":"Jin","sequence":"first","affiliation":[{"name":"Hunan University, Changsha, China"}]},{"given":"Srinivasan","family":"Murali","sequence":"additional","affiliation":[{"name":"The University of Texas at Arlington, Arlington, TX, USA"}]},{"given":"Huadi","family":"Zhu","sequence":"additional","affiliation":[{"name":"The University of Texas at Arlington, Arlington, TX, USA"}]},{"given":"Ming","family":"Li","sequence":"additional","affiliation":[{"name":"The University of Texas at Arlington, Arlington, TX, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790109"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.3991\/ijim.v11i1.6368"},{"key":"e_1_3_2_2_3_1","unstructured":"Arduino. 2020. Arduino nano. (2020). https:\/\/www.arduino.cc"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301311"},{"key":"e_1_3_2_2_5_1","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy.","author":"Backes Michael","unstructured":"Michael Backes, Tongbo Chen, Markus Duermuth, Hendrik PA Lensch, and Martin Welk. Tempest in a teapot: Compromising reflections revisited. In Proceedings of the IEEE Symposium on Security and Privacy."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.25"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180436"},{"key":"e_1_3_2_2_8_1","unstructured":"Eli Billauer. 2020. Peak detection algorithm. (2020). http:\/\/billauer.co.il\/peakdet.html"},{"key":"e_1_3_2_2_9_1","volume-title":"Proceedings of the USENIX Summit on Hot Topics in Security.","author":"Cai Liang","year":"2011","unstructured":"Liang Cai and Hao Chen. 2011. TouchLogger: Inferring Keystrokes on Touch Screen from Smartphone Motion. In Proceedings of the USENIX Summit on Hot Topics in Security."},{"key":"e_1_3_2_2_10_1","volume-title":"Handbook of electrostatic processes","author":"Chang Jen-Shih","unstructured":"Jen-Shih Chang, Arnold J Kelly, and Joseph M Crowley. 1995. Handbook of electrostatic processes .CRC Press."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00010"},{"key":"e_1_3_2_2_12_1","volume-title":"Proceedings of the IEEE\/ACM International Symposium on Microarchitecture.","author":"Dey Moumita","unstructured":"Moumita Dey, Alireza Nazari, Alenka Zajic, and Milos Prvulovic. Emprof: Memory profiling via em-emanation in iot and hand-held devices. In Proceedings of the IEEE\/ACM International Symposium on Microarchitecture."},{"key":"e_1_3_2_2_13_1","unstructured":"Dnschecker.org. 2020. MAC Address Lookup. (2020). https:\/\/dnschecker.org\/mac-lookup.php"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.2528\/PIERC13042302"},{"key":"e_1_3_2_2_15_1","first-page":"1","article-title":"An introduction to sensor fusion. Vienna University of Technology","volume":"502","author":"Elmenreich Wilfried","year":"2002","unstructured":"Wilfried Elmenreich. 2002. An introduction to sensor fusion. Vienna University of Technology, Austria, Vol. 502 (2002), 1--28.","journal-title":"Austria"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243755"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2012.6459891"},{"key":"e_1_3_2_2_18_1","volume-title":"Proceedings of the ACM SIGSAC Conference on Computer and Communications Security.","author":"Kune Denis Foo","year":"2010","unstructured":"Denis Foo Kune and Yongdae Kim. 2010. Timing attacks on pin input devices. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security."},{"key":"e_1_3_2_2_19_1","unstructured":"Fujitsu. 2021. Capacitive Touch Sensors: application fields technology overview and implementation example. (2021). https:\/\/www.fujitsu.com\/downloads\/MICRO\/fme\/articles\/fujitsu-whitepaper-capacitive-touch-sensors.pdf"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44371-2_25"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-015-9224-2"},{"key":"e_1_3_2_2_22_1","unstructured":"Chris Hoffman. 2020. How to See Who's Connected to Your Wi-Fi Network. (2020). hhttps:\/\/www.howtogeek.com\/204057\/how-to-see-who%E2%80%99s-connected-to-your-wi-fi-network\/"},{"key":"e_1_3_2_2_23_1","unstructured":"Leander Kahney. 2019. Your iPhone could be ?unbreakable ' if it were just 1 mm thicker. (2019). https:\/\/www.cultofmac.com\/624356\/your-iphone-could-be-unbreakable-if-it-were-just-1mm-thicker\/"},{"key":"e_1_3_2_2_24_1","unstructured":"Markus Guenther Kuhn. 2002. Compromising emanations: eavesdropping risks of computer displays. Ph.D. Dissertation. Citeseer."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1080\/15980316.2014.947389"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.3390\/s18113637"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978397"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155447"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790122"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813668"},{"key":"e_1_3_2_2_31_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium.","author":"Liu Zhuoran","year":"2020","unstructured":"Zhuoran Liu, Niels Samwel, L\u00e9o Weissbart, Zhengyu Zhao, Dirk Lauret, Lejla Batina, and Martha Larson. 2020. Screen Gleaning: A Screen Reading TEMPEST Attack on Mobile Devices Exploiting an Electromagnetic Side Channel. In Proceedings of the Network and Distributed System Security Symposium."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737591"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897905"},{"key":"e_1_3_2_2_34_1","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy.","author":"Maruyama Seita","year":"2019","unstructured":"Seita Maruyama, Satohiro Wakabayashi, and Tatsuya Mori. 2019. Tap'n Ghost: A Compilation of Novel Attack Techniques against Smartphone Touchscreens. In Proceedings of the IEEE Symposium on Security and Privacy."},{"key":"e_1_3_2_2_35_1","volume-title":"https:\/\/www.mathworks.com\/help\/signal\/ug\/envelope-extraction-using-the-analytic-signal.html","author":"Extraction Envelope","year":"2021","unstructured":"Mathworks. 2021. Envelope Extraction. (2021). https:\/\/www.mathworks.com\/help\/signal\/ug\/envelope-extraction-using-the-analytic-signal.html"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307666"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.2528\/PIERM12122406"},{"key":"e_1_3_2_2_38_1","unstructured":"Nirsoft. 2020. Who is connected sniffer. (2020). https:\/\/www.nirsoft.net\/utils\/who_is_connected_sniffer.html"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2162081.2162095"},{"key":"e_1_3_2_2_40_1","volume-title":"Polymeric foams for flexible and highly sensitive low-pressure capacitive sensors. npj Flexible Electronics","author":"Pruvost Mickael","year":"2019","unstructured":"Mickael Pruvost, Wilbert J Smit, C\u00e9cile Monteux, Philippe Poulin, and Annie Colin. 2019. Polymeric foams for flexible and highly sensitive low-pressure capacitive sensors. npj Flexible Electronics, Vol. 3, 1 (2019), 1--6."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.18626"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046769"},{"key":"e_1_3_2_2_43_1","volume-title":"Applied bioelectricity: from electrical stimulation to electropathology","author":"Reilly J Patrick","unstructured":"J Patrick Reilly. 2012. Applied bioelectricity: from electrical stimulation to electropathology .Springer Science & Business Media."},{"key":"e_1_3_2_2_44_1","volume-title":"Oliver Dietz, Eyal Ofek, Michel Pahud, Per Ola Kristensson, et al.","author":"Schneider Daniel","year":"2019","unstructured":"Daniel Schneider, Alexander Otte, Travis Gesslein, Philipp Gagel, Bastian Kuth, Mohamad Shahm Damlakhi, Oliver Dietz, Eyal Ofek, Michel Pahud, Per Ola Kristensson, et al. 2019. Reconviguration: Reconfiguring physical keyboards in virtual reality. IEEE transactions on visualization and computer graphics, Vol. 25, 11 (2019), 3190--3201."},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660360"},{"key":"e_1_3_2_2_46_1","volume-title":"Hearing your touch: A new acoustic side channel on smartphones. arXiv preprint arXiv:1903.11137","author":"Shumailov Ilia","year":"2019","unstructured":"Ilia Shumailov, Laurent Simon, Jeff Yan, and Ross Anderson. 2019. Hearing your touch: A new acoustic side channel on smartphones. arXiv preprint arXiv:1903.11137 (2019)."},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23060"},{"key":"e_1_3_2_2_48_1","unstructured":"Unite4buy. 2021. iPhone SE specification. (2021). https:\/\/unite4buy.com\/Apple-iPhone-SE-2020--3--128Gb-buy\/"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(85)90046-X"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2013.116"},{"key":"e_1_3_2_2_51_1","volume-title":"Proceedings of the USENIX Security Symposium.","author":"Vuagnoux Martin","year":"2009","unstructured":"Martin Vuagnoux and Sylvain Pasini. 2009. Compromising Electromagnetic Emanations of Wired and Wireless Keyboards.. In Proceedings of the USENIX Security Symposium."},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594384"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2011.146"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2934690"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3286978.3287026"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516709"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185465"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3300061.3300118"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2688467"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660288"},{"key":"e_1_3_2_2_61_1","volume-title":"Mobile Information Systems","volume":"2016","author":"Zhang Jie","year":"2016","unstructured":"Jie Zhang, Xiaolong Zheng, Zhanyong Tang, Tianzhang Xing, Xiaojiang Chen, Dingyi Fang, Rong Li, Xiaoqing Gong, and Feng Chen. 2016. Privacy leakage in mobile sensing: Your unlock passwords can be leaked through wireless hotspot functionality. Mobile Information Systems, Vol. 2016 (2016)."},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660296"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/1609956.1609959"},{"key":"e_1_3_2_2_64_1","unstructured":"Anya Zhukova. 2020. How To See Who Is Connected To My WiFi. (2020). https:\/\/helpdeskgeek.com\/how-to\/determine-computers-connected-to-wireless-network\/"}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event Republic of Korea","acronym":"CCS '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484549","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484549","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484549","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:53:36Z","timestamp":1763499216000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484549"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":64,"alternative-id":["10.1145\/3460120.3484549","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3484549","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}